The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Distributive Intrusion Detection System (DIDS) Attack Signature Analysis Deliverable 2.1

Marvin J. Christenson, E. Eugene Schultz
Added 2002-07-26


BITS: A Smartcard Protected Operating System

Paul C. Clark
Added 2002-07-26

Computer Viruses: Theory and Experiments

Fred Cohen
Added 2002-07-26

DSS and Clipper

David A. Curry
Added 2002-07-26

Improving the Security of Your Unix System

David A. Curry
Added 2002-07-26

The MOTHRA Software Testing Environment

Richard A. DeMillo, Eugene H. Spafford
Added 2002-07-26

A Computer Virus Primer

Eugene H. Spafford, Kathleen A. Heaphy, David J. Ferbrache
Added 2002-07-26

Crisis and Aftermath

Eugene H. Spafford
Added 2002-07-26

Database: SciSearch, 1974-1993/02 Week 4

Katherine M. Markee, Sandeep Kumar
Added 2002-07-26

Database: Inspec, 1969-1993/ Mar W3.

Katherine M. Markee, Sandeep Kumar
Added 2002-07-26

A Comparison of Receiver-Initiated and Sender-Initiated Dynamic Load Sharing

Derek L Eager, Edward D. Lazowska, John Zahorjan
Added 2002-07-26

A Bibliography of Windowing Systems and Security

Jeremy Epstein
Added 2002-07-26

Security in Open Systems

R. Bagwill, J. Barkley, L. Carnahan, S. Chang, R. Kuhn, P. Markovitz, A. Nakassis, K. Olsen, M. Ransom,J. Wack

The Public Switched Network (PSN) provides National Security and Emergency Preparedness (NS / EP) telecommunications.  SErvice vendors, equipment manufacturers, and the federal government are concerned that vulnerabilities in the PSN could be exploited and result in disruptions or degradation of service.  To address these threats, NIST is assisting the Office Manager, National COmmunications System (OMNCS), in the areas of computer and network security issues that result from the use of open system platforms, i.e. products based on open standards such as POSIX and OSI, in the telecommunications industry. This report is intended to provide information for the practicing involved in development of telecommunications application software.  In short, it provides answers to the questions \“How do I Build security into software based on open system platforms?\”  It is not intended to be tutorial in nature and assumes some knowledge of open systems and Unix.  Many of the references cited are tutorial and may be used to obtain any background information required. For each topic in open system security, the goal of this report is to locate in one place the most informed exposition possible for that topic.  Consequently, this report is the result of the efforts of several individuals who possess the expertise to author the various chapters.  The author(s) of each chapter is identified after the chapter title.

Added 2002-07-26